I am looking for an asymmetric encryption algorithm, which allows to encrypt a secret with multiple public keys, but to reveal the secret all private keys must be used. You shouldn't be able to tell ...

-edit- After following a chain of links from this question I see this is similar/duplicate of Why should one not use the same asymmetric key for encryption as they do for signing? but this question ...

I understand that PKI uses digital certificates to link a public key to an entity, but is there anything similar for symmetric cryptography.
If, theoretically, PKI didn't exist, how do you know you ...

I’m at the beginning of my journey into the world of security. I am reading about the most fundamentals topics and I have encountered something unusual that has thrown me.
The Conundrum:
I have come ...

This TED talk brought me here. First of all, to those who created ProtonMail: Nice job!!. Regardless of what people say, it's definitely a big step forward from tradition options like Hotmail, Gmail ...

i want to develop a mobile bank app (windows phone, android, ios) that interact with bank channel. first time when user opens application the key exchange process begins and at end of this process a ...

The system I want to implement has the following requirement: All users can insert some sensitive data, but only one, master user, can see it.
There is any known, already implemented solution to this ...

I am relatively new to the world of cryptography and was wanting to develop a webpage which allows credit card payments. Thus, I looked into the digicert ssl service, hoping that it could do what I ...

A program is using a private key to read messages. To improve security, besides randomness, I'm trying to create the longest passphrase that makes sense.
How long should it be? After which amount of ...

Yesterday in my class we learnt how to send a message from Alice to Bob with
the achieved goals of confidentiality, integrity and authenticity.
In order to have a better performance we use a hybrid ...

We have an Authority Center (CA) generating some public and private keys for each client (more than one pair for each client). One method for sending keys to client is sharing a secret key between CA ...

Since I am new to encryption and have recently been losing stuff, I decided to start a file that contains some passwords for online accounts and whatnot, encrypt it, back it up (and keep a single copy ...

I have been looking for an operational security guide for generating one's asymmetric key pair for (Open)PGP. I have found plenty of technical guides for how to use GnuPG to generate RSA key-pairs, ...

I'm building a database that symmetrically encrypts user data. Nothing super sensitive, I'd use a third-party if it was. The data is encrypted with a surrogate key; the user must enter a password to ...

I was wondering that what make RSA Asymmetric Cryptography Algorithm special.
So I wrote a very simple algorithm that do the same work (Generate Public and Private Key)
Now I want to ask you that What ...

Let's say I have an encrypted message. I want to make it so that someone is able to decrypt it. The only way of giving it to them is online. For the purposes of this question, I can't call, mail or ...

With 397 rolls of a fair 6-sided die (not my favorite use of time, but certainly not infeasible), I could generate more than 1024 random bits. Could I use those bits to generate a keypair that could ...

As part of an application I am developing, I am required to store user email adresses on a cloud DB.
The email address is not required to be in plain text for the normal operation of the application.
...